Security kernel

Results: 400



#Item
341Kernel / Ring / Loadable kernel module / User space / Linux Security Modules / Computer security / Mach / Operating system / Computer architecture / System software / Linux kernel

Kernel Level Security Philippe Biondi 26th September 2003 Abstract

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:43:05
342Monolithic kernels / Linux / Linux kernel / Kernel / HTTP cookie / Biondi / Ring / Artel / Computer architecture / Software / Computing

Security at Kernel Level Philippe Biondi — Libre Software Meeting July 10, 2002

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:43:36
343Monolithic kernels / Kernel / Biondi / Linux kernel / Ring / HTTP cookie / Computer architecture / Software / Computing

Security at Kernel Level (again) Philippe Biondi

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:41:19
344Monolithic kernels / Linux / Linux kernel / Biondi / Kernel / HTTP cookie / Ring / Computer architecture / Software / Computing

Security at Kernel Level LIDS Philippe Biondi — May 30, 2002

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:43:47
345National Security Agency / Security-Enhanced Linux / Kernel / Kinsmod / Linux kernel / RSBAC / Openwall Project / Ring / Computer security / Software / Computer architecture

Kernel approach for Security — Open Source Developpers’ European Meeting Philippe Biondi — Webmotion Inc.

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:44:37
346Cryptography / Business law / Copyright law / Process management / Trusted Execution Technology / Kernel / Trusted Platform Module / Operating system / Data dependency / Computer security / Computing / Trusted computing

Remote Attestation on Program Execution ∗ Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Bing Xie1 , Hong Mei1 1 2

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-11-03 21:07:22
347X86 architecture / Information theory / Applied mathematics / Mathematics / CPUID / Machine code / Entropy / Random number generation / Linear congruential generator / Pseudorandom number generators / Randomness / Cryptography

Revisiting iOS Kernel (In)Security: Attacking the early random() PRNG Tarjei Mandt Azimuth Security [removed]

Add to Reading List

Source URL: mista.nu

Language: English - Date: 2014-03-12 22:15:16
348Monolithic kernels / Linux / Linux kernel / Biondi / Kernel / HTTP cookie / Ring / Computer architecture / Software / Computing

Security at Kernel Level LIDS Philippe Biondi — February 16, 2002

Add to Reading List

Source URL: www.secdev.org

Language: English - Date: 2005-09-20 11:40:16
349Cryptography / Business law / Copyright law / Trusted Execution Technology / Kernel / Mandatory access control / Attestation clause / Law of obligations / Ring / Computer security / Security / Trusted computing

Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:05:05
350Trusted computing / Disk encryption / Kernel / Trusted Execution Technology / Virtual machine / Ring / Trusted Platform Module / Operating system / Loadable kernel module / Software / Computing / Computer security

SECURITY & PRIVACY Rapid Trust Establishment for Pervasive Personal Computing

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-10-30 08:22:15
UPDATE